Asus E7153 Network Card User Manual


 
ASUS Wi-Fi GO! card 3-5
3.2 Wi-Fi Engine wireless security
To protect your wireless network, you need to set up the security on your Wi-Fi
GO! card.
Network authentication
Network authentication uses certain types of mechanism to identify authenticated
wireless clients. Wi-Fi GO! card supports the following authentication methods:
Open system: This option disables authentication protection for your wireless
network. Under the Open mode, any wireless client can
connect to your wireless network.
Shared key: Shared means using the same WEP keys for authentication
and encryption.
WPA-PSK: WPA-PSK (Pre-Shared Key) is the solution for home and
SOHO users who have no 802.11X authentication server
within the LAN. To setup WPA-PSK, you need to input a
passphrase and let the system generate the key. Combination
of letters, numbers and non-alphnumeric charecters is
recommended for ensuring security.
WPA2-PSK: WPA2 (WI-FI Protected Access 2) provides network
administrators with a high level of assurance that only
authorized users can access the network. Based on the
ratied IEEE 802.11i standard, WPA2 provides government
grade security. The WPA2 can be enabled in two versions --
WPA2-Personal and WPA2-Enterprise. WPA2-Personal
protects unauthorized network access by utilizing a set-up
password. WPA2-Enterprise veries network users through a
server. WPA2 is backward compatible with WPA.
Encryption
Encryption is used to convert plain text data into unreadable codes with certain
type of algorithm before capsulation for wireless transmission. Wi-Fi GO! card
supports the following encryption methods:
WEP: WEP stands for Wired Equivalent Privacy. It uses 64 or
128-bit static keys. You can let the system generate the WEP
keys by inputting a Passphrase.
TKIP: Temporal Key Integrity Protocol (TKIP) dynamically generates
unique keys to encypt every data packet in a wireless session.
AES: Advanced Encryption Standard (AES) is a dependable
encryption adopted in WPA2 or IEEE802.11i standard. It offers
stronger protection and greatly increases the complexity of
wireless encryption.